BOSTON--(BUSINESS WIRE)--ThreatX, the leading API and application protection platform, today announced the expansion of its platform offering with the release of a new Botnet Console and API catalog 2 ...
A notorious cryptocurrency mining botnet has begun targeting misconfigured Docker APIs, according to CrowdStrike. LemonDuck has been observed exploiting ProxyLogon vulnerabilities in Microsoft ...
Attackers are actively scanning for exposed Docker APIs on port 2375 and use them to deploy a malicious payload which drops a Dofloo Trojan variant, a malware known as a popular tool for building ...
A threat actor targeting exposed Docker APIs has updated its malicious tooling with more dangerous functionality that could lay the foundation for a complex botnet. The activity was first reported in ...
Two separate Mirai botnet campaigns are exploiting a critical flaw in a somewhat unlikely target. The Akamai Security Intelligence and Response Team recently observed exploitation of CVE-2025-24016, a ...
A botnet used for illicit cryptocurrency mining activities is abusing Bitcoin (BTC) transactions to stay under the radar. According to new research published by Akamai on Tuesday, the technique is ...
A new attack campaign deploys malicious container images on cloud servers by exploiting insecure Docker Engine API endpoints. The malicious image contains a distributed denial-of-service (DDoS) botnet ...
Chances are that if you deploy a Linux server online these days and you leave even the tiniest weakness exposed, a cybercrime group will ensnare it as part of its botnet. The latest of these threats ...
A number of botnets are pummeling a nearly year-old command-injection vulnerability in TP-Link routers to compromise the devices for IoT-driven distributed denial of service (DDoS) attacks. There ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results